BACKGROUNDAs people increasingly use mobile devices to make payments either online, or in person at point of sale devices, authentication becomes increasingly important. Verifying the identity of the person using the mobile device to make the payment is important to decrease the risk of fraud and illicit payments. Authentication is also important when using credit cards and other physical forms of payment with digital payment information embedded thereon. Smart cards that store data on integrated circuits rather than magnetic stripes and require chip-and-PIN or chip-and-signature for verification are an improvement, but even they cannot completely prevent others from using the card if the PIN number or signature is known. Using current technology, it is not possible to make sure that the person using the card is physically present at the time of payment.
SUMMARYThe following presents a simplified summary in order to provide a basic understanding of some aspects of the innovation. This summary is not an extensive overview of the innovation. It is not intended to identify key/critical elements or to delineate the scope of the innovation. Its sole purpose is to present some concepts of the innovation in a simplified form as a prelude to the more detailed description that is presented later.
The disclosure disclosed and claimed herein, in one aspect thereof, includes systems and methods that facilitate authenticating a user making a payment using smart dust. Smart dust, as discussed herein is a system of small microelectromechanical systems (MEMs) devices that can have sensors that collect data and transfer it to a base station device. The MEMs devices can collect sensor information about the person, capturing audio data, optical data, temperature data, pressure data, and motion data and compare it to data associated with a user profile to determine that the person making the payment is the same person associated with the user profile. The sensor data can comprise biometric data relating to the height of the person, weight of the person, heart rate or pulse of the person, blood pressure, and or body temperature. The sensor data can also capture images of the person, and facial recognition can be performed to authenticate the person. Once the person's identity has been confirmed, and thus authenticated, the payment request can be confirmed and payment made, via either the mobile device or credit card.
The MEMs devices can be small enough that they can be suspended in the air and in some embodiments be self-propelled. In an embodiment, the MEMs devices/sensors can be issued by one or more financial institutions associated with either a point of sale device or the credit cards or banks. The MEMs devices can be carried by the person or stored in a base station device. In response to determining that a payment is being made, and authentication is required, the base station device can activate the MEMs devices which can proceed to collect data to authenticate the user. In an embodiment, the base station device or the MEMs devices can determine which MEMs devices to activate, based on the signal to noise ratio of data received from the devices, or based on the quality of data received. In other embodiments, the MEMs devices can be selected based on other contextual or environmental factors. For instance, audio sensors to detect heart rate or breathing rate may not be activated when ambient sound levels are above a predetermined level. Similarly, optical sensors may not be activated if light levels are below another predetermined level.
For these considerations, as well as other considerations, in one or more embodiments, a base station device can include a memory to store computer-executable instructions and a processor, coupled to the memory, to facilitate execution of the computer-executable instructions to perform operations. The operations can include receiving a request for authentication associated with a user access request. The operations can also include transmitting an instruction to collect sensor data to a set of microelectromechanical systems sensors. The operations can also include receiving the sensor data from the set of microelectromechanical systems sensors, wherein the sensor data comprises biometric data. The operations can also include authenticating the user access request based at least in part on the biometric data
In another embodiment, a method comprises determining, by a base station device comprising a processor, that an access request is to be authenticated, wherein the access request is associated with a user profile. The method can also include transmitting an instruction to activate a set of microelectromechanical systems devices, wherein the set of microelectromechanical systems devices are configured to collect sensor data. The method can also include receiving the sensor data from the set of microelectromechanical systems devices, wherein the sensor data comprises biometric data. The method can also include authenticating the user access request based at least in part on the biometric data matching data associated with user profile.
In another embodiment, a non-transitory computer-readable device, storing thereon, computer-executable instructions, that when executed by a processing device, perform operations including determining that an access request is to be authenticated, wherein the access request is associated with a user profile. The operations can also include transmitting an instruction to activate a set of microelectromechanical systems devices, wherein the set of microelectromechanical systems devices are configured to collect sensor data. The operations can also include receiving the sensor data from the set of microelectromechanical systems devices, wherein the sensor data comprises biometric data. The operations can also include authenticating the user access request based at least in part on the biometric data matching data associated with user profile.
To accomplish the foregoing and related ends, certain illustrative aspects of the innovation are described herein in connection with the following description and the annexed drawings. These aspects are indicative, however, of but a few of the various ways in which the principles of the innovation can be employed and the subject innovation is intended to include all such aspects and their equivalents. Other advantages and novel features of the innovation will become apparent from the following detailed description of the innovation when considered in conjunction with the drawings.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 is an illustration of an example system for authenticating a user using smart dust in accordance with one or more aspects of the disclosure.
FIG. 2 is an illustration of an example system for authenticating a user using smart dust in accordance with one or more aspects of the disclosure.
FIG. 3 is an illustration of an example system for activating a set of smart dust motes in accordance with one or more aspects of the disclosure.
FIG. 4 is an illustration of an example system for selecting a set of smart dust motes to authenticate a user in accordance with one or more aspects of the disclosure.
FIG. 5 is an illustration of an example system for authenticating a user using smart dust in accordance with one or more aspects of the disclosure.
FIG. 6 is an illustration of an example base station device in accordance with one or more aspects of the disclosure.
FIG. 7 is an illustration of an example flow chart of a method for authenticating a user using smart dust, according to one or more embodiments.
FIG. 8 is an illustration of an example flow chart of a method for authenticating a user using smart dust, according to one or more embodiments.
FIG. 9 is an illustration of an example computing environment where one or more of the provisions set forth herein are implemented, according to one or more embodiments.
FIG. 10 is an illustration of an example computing environment where one or more of the provisions set forth herein are implemented, according to one or more embodiments.
DETAILED DESCRIPTIONThe following terms are used throughout the description, the definitions of which are provided herein to assist in understanding various aspects of the disclosure.
As used in this disclosure, the term “device” or “client device” refers to devices, items or elements that may exist in an organization's network, for example, users, groups of users, computer, tablet computer, smart phone, iPad®, iPhone®, wireless access point, wireless client, thin client, applications, services, files, distribution lists, resources, printer, fax machine, copier, scanner, multi-function device, mobile device, badge reader and most any other networked element.
The innovation is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the subject innovation. It may be evident, however, that the innovation can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the innovation.
While specific characteristics are described herein, it is to be understood that the features, functions and benefits of the innovation can employ characteristics that vary from those described herein. These alternatives are to be included within the scope of the innovation and claims appended hereto.
While, for purposes of simplicity of explanation, the one or more methodologies shown herein, e.g., in the form of a flow chart, are shown and described as a series of acts, it is to be understood and appreciated that the subject innovation is not limited by the order of acts, as some acts may, in accordance with the innovation, occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology in accordance with the innovation.
As used in this application, the terms “component” and “system” are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components can reside within a process and/or thread of execution, and a component can be localized on one computer and/or distributed between two or more computers.
FIG. 1 illustrates anexample system100 for authenticating a user using smart dust in accordance with one or more aspects of the disclosure. In an embodiment,smart dust104, can collect sensor data associated with a user, and then communicate that sensor data tobase station device102. In an embodiment, the sensor data can be forwarded to aserver106 that can process the sensor data to perform an authentication of the user based on the sensor data. In other embodiments, thebase station devcice102 can analyze the sensor data collected bysmart dust104 to authenticate the user, and then pass a notification of authentication toserver106.
In an embodiment,smart dust104 can be made up of MEMs device sensors that can collect a variety of sensor data. The MEMs device sensors can collect optical data, infrared data, audio data, electromagnetic field data, temperature data, air pressure data, location data and/or motion data.
The optical data can include data used to perform facial or body recognition. The optical data can also be used to gather biometric data (e.g., weight of the user, facial recognition data, fingerprint data, and etc.) in conjunction with one or more sets of data from the other sensors. The audio data can be used to authenticate a user based on voice recognition, or can be used to detect heart rate, blood pressure, and other biometric data. The infrared data can be used to determine various biometric data about a person such as breathing rate, body temperature, and etc. The electromagnetic field data can be used to measure magnetic fields and/or read any RFID tags that the user may carry. The motion data and air pressure data can be used to monitor for heart rate, breathing rate, and other biometric data. The location data can be GPS data or other location data (determined via inertial sensing or network location) that can try to identify the location of thesmart dust104.
The MEMs device sensors (or “motes”) that make upsmart dust104 can be suspended in air and surround, or be near a user while collecting data. In some embodiments, the motes can be self-propelled and able to move around. In other embodiments, the motes may move passively on wind currents, or using Brownian motion. In an embodiment, the motes can be released bybase station102 upon activation. The motes may also be carried by a user and released when the user attempts to make a purchase using a mobile payment or a credit card payment. In an embodiment, thebase station device102 can be part of a point of sale system at a retail or customer service establishment. In other embodiments,base station device102 can be carried by a user or be a mobile device carried by the user and store the motes therein.
In an embodiment, the motes of thesmart dust104 can be provided by a financial institution associated withserver106. In this embodiment, the motes can be configured with metadata information such as the relationship details of the customer, and also the family of MEMs/motes that were provided to the customer. The individual motes would have the same parent information and some specific information of that individual mote. The group of motes can form a network and act as a close field communicating devices (some of the motes can transmit data to thebase station102 and other motes can relay information from other motes to thebase station102. Some of the motes can also perform some processing that normally is performed by thebase station102. In this way, the motes can act as a circuit junction for the series of motes. Since the motes can form a circuit, motes that are provided that are not part of the group provided by the financial institution can break the circuit, thus making identification of the foreign mote easy.
In an embodiment, thesmart dust104 can be activated in response to receiving a notification that the user is trying to make a payment. For instance, the user can try to make a payment with their mobile device, or with a credit card, andserver106 can send a notification of pending payment or an authorization request tobase station device102.Base station device102 can then send an instruction to activate thesmart dust104, which can proceed to collect sensor data relating to the user. The sensor data can be used to authenticate the user, and thenserver106 can proceed to process the payment or send a notification about authentication to the payment processor.
In an embodiment, thebase station device102 can compare the sensor data received from thesmart dust104 to a user profile, and based on the similarity, authenticate the user. For instance, if a set of biometric data matches the user profile stored biometric data within a predetermined range, then the user can be authenticated. If there are multiple types of biometric data being compared, the similarity may not need to be as close. For instance, if only data relating to facial recognition is collected, and the data matches 94% of the user profile data, then the authentication, which may require a 95% match, may fail. If the facial recognition data, which matches at 94%, is used in conjunction with heart rate data which also matches at 94%, then the authentication may be confirmed. Various matching rates can be authenticated based on the different combinations of sensor data types. Certain forms of biometric data may be considered of a higher quality, or functionality for the purposes of authentication than other types of biometric data. For instance, optical scanning which scans fingerprints can be more definitive for the purposes of authenticating a user than heart rate data. The predetermined matching levels can be set accordingly based on the type of data being collected.
In an embodiment,base station device102 can determine whether to collect data from one or more of the motes of the set of MEMs devices that make upsmart dust104. For instance, the communications between thebase station device102 and the individual motes may have interference or increased packet loss (e.g., due to range from the base station device102) for certain motes. If the signal to noise ratio for communications from particular motes to thebase station device102 is below a predetermined criterion, the mote may not be selected for authenticating the user. In other embodiments, the environmental context may reduce the efficacy of the sensor data received from certain types of sensors. For instance, if the lighting is poor, optical data may be of less value than temperature, audio and pressure data. In other embodiments, if the ambient noise level is high, optical data may be of more value than audio data.
In an embodiment, the MEMs devices of thesmart dust104 can include respective identification numbers (e.g., serial numbers). When transmitting the sensor data to thebase station device102, the motes can send the serial numbers as well. Since thesmart dust104 may be issued to the user by the financial institution associated with the credit card or payment method, thesmart dust104 serial numbers can also be used to authenticate the user and allow the payment to proceed.
The serial numbers can be used to generate a virtual card number that is established based on a communication channel between thesmart dust104 and the credit card or other payment method. Once the user is authenticated, the virtual number can be used to process the payment. If thesmart dust104 is not in the vicinity of the credit card, the virtual number may not be generated, and the payment will not proceed. In an embodiment, the virtual number can be based on a function of the biometric data and the respective identification numbers.
In an embodiment, the MEMs devices of thesmart dust104 can be used to generate a unique key that is created as a token. This can be performed on the client side with thebase station device102, and thesmart dust network104. An algorithm can be used to generate a unique key from the connected motes to enable a transaction. The customer device or channels can be interlaced withsmart dust104 using very near field communications. The channels can be between a point of sale device, a mobile device, or any other devices that have biometric scanning enabled in order to capture fingerprint images, retina scans, etc. The subset of selected motes by a customer can form a pattern where the mote IDs can form a “String”. The “Smart Key” can be generated as a String along with biometric image customer device type. Based on the motes selection, the string can have nCr probability where r is the customer selected subset motes count and n is superset of all motes available with customer. The motes IDs could be static or dynamic in nature. If static, the mote can emit a number and if dynamic, the motes can emit random numbers (the same dynamic number ID emotion logic will be applied to decryption also).
The string can be a combination of first and last characters of a selected number of “Motes IDs” insmart dust104 that forms a string. A biometrics image can include either fingerprint or retina, or both. The biometrics image can be stored as Binary Large Object (BLOB) or equivalent data type.
For static smart keys, the string along with biometrics image blob and device type will form a “Smart Key”. As an example of a static smart key, if there eight motes say, 1, 2, 3, 4, 5, 6, 7 and 8 and the customer selected 1, 3, and 7, the first and last characters of mote IDs,mote 1—‘$ and Z’, mote 2—‘˜ and 5’, and mote 3—‘7 and 8’.
For Dynamic Key Generation, the bank supplies pre-configured set of motes (a family of motes). These family of motes are configured based on the customer details like the account number, name of the customer, expiry date of the motes, sibling mote details, parameters of the activities each mote would perform. The motes in the family can be numbered in a series or at random could be a alpha-numerical or numeric. The bank supplied family of motes (e.g., 8 motes) can be used like a Makeup Kit (foundation, concealer, blush, eye shadow, eye liner, power, lipstick, etc.). Each mote in the family can perform an individual activity as in the makeup kit, these could be GPS, Ambient Temperature, Body temperature, Pulse, Altitude, Color Sensor, Sound Sensor, IR sensor, image scanner, optical LOS, etc. Customer evaluate what you wear daily and what you don't wear. The essential daily wear can be considered as mandatory. The other combinations could be for special occasions, and extra care. The customer wears what is a daily wear mandated, say minimum two motes. The customer would wear the additional motes from the family in some embodiments. The recommended motes that are required to form an network are specified by a business rule say for example 3 such motes. Now as two of the motes are mandatory the customer has an option to pick up at least one additional mote from the family.
The customer/Base Station device validates the Motes ID details and determine whether the motes are active and whether the mote reading unit is correct. The data received by from the motes are relevant as per motes design, eg. First motes information received by the device is temperature in centigrade? The unit can be in centigrade, NW/NE/SE/SW, /min (preferable in dimensional analysis unites). The customer/base station device can form a smart key and transmits via 3G/4G/5G/Wi-Fi along with the supplementary data. Transmitted information=Smart Key=[Mote ID]+[Mote information]. Mote information can include a specified mote reading+Signal strength information+time stamp. The signal strength information can be in dB-microvolts per meter (dBμV/m) Or dBu e.g. 60 dBu. The time stamp is the time at which the base station had transmitted the key.
On the server side, the utility engine can receive the key from the client side and grants access or denies access (transfer key). The utility engine can recognize the transfer key and communicates with IDM server. The IDM server maintains a log in the persona management system. Upon authentication, the IDM grants access to the financial banking systems as applicable.
The server side decryption algorithm can be as follows: 1) Decrypt <Key>. 2) Validate Approved motes with nCr probability (Approval Motes). 3) Validate customer biometric image (approval Customer Finger Print or Retina or both. 4) Verify the mote information data. 5) The correctness with in an acceptable variation. 6) Since the customer/base device is very near to motes, the emitted information should not have huge variations with device data. 7) E.g. Mote 01 emitted temperature as 23 C, and Mote 02 emitted 377833N, 1224167 W (last four digits are decimals) Mote 03 emitted 88. Since first two information's are near to device it can validate with an allowed variation. Since customer profile knows to the device, it also validates the pulse. 8) Validates the signal strength. 9) If all the mote are not having signal strength with a specified variation i.e. if one or more motes signal strength is deviating the rest can be called for suspicious transaction
Turning now toFIG. 2, illustrated isexample system200 for authenticating a user using smart dust in accordance with one or more aspects of the disclosure.
Insystem200, abase station device206 can receive an alert that auser202 is attempting to initiate a payment using amobile device204, and the base station device can send an instruction to activate a set ofsmart dust device210 to authenticateuser202. Themobile device204 can send a payment request notification toserver208. Before processing the payment, the server can try to authenticate theuser202 making the payment. The server can send an authentication request tobase station device206 which can activate thesmart dust210 which collects sensor data about theuser202. The sensor data can be returned to thebase station device206 which can perform the authentication. In other embodiments, thebase station device206 can forward the sensor data toserver208 which can perform the authentication. Once the authentication is performed,server208 can process the payment frommobile device204.
In an embodiment,smart dust210 can be made up of MEMs device sensors that can collect a variety of sensor data. The MEMs device sensors can collect optical data, infrared data, audio data, electromagnetic field data, temperature data, air pressure data, location data and/or motion data.
The optical data can include data used to perform facial or body recognition. The optical data can also be used to gather biometric data (e.g., weight of theuser202, facial recognition data, fingerprint data, and etc.) in conjunction with one or more sets of data from the other sensors. The audio data can be used to authenticate a user based on voice recognition, or can be used to detect heart rate, blood pressure, and other biometric data. The infrared data can be used to determine various biometric data about a person such as breathing rate, body temperature, and etc. The electromagnetic field data can be used to measure magnetic fields and/or read any RFID tags that the user may carry. The motion data and air pressure data can be used to monitor for heart rate, breathing rate, and other biometric data. The location data can be GPS data or other location data (determined via inertial sensing or network location) that can try to identify the location of thesmart dust210.
The MEMs device sensors (or “motes”) that make upsmart dust210 can be suspended in air and surround, or be near theuser202 while collecting data. In some embodiments, the motes can be self-propelled and able to move around. In other embodiments, the motes may move passively on wind currents, or using Brownian motion. In an embodiment, the motes can be released bybase station206 upon activation. The motes may also be carried by a user and released when the user attempts to make a purchase using a mobile payment or a credit card payment. In an embodiment, thebase station device206 can be part of a point of sale system at a retail or customer service establishment. In other embodiments,base station device206 can be carried by theuser202 by amobile device204.
In an embodiment, thebase station device206 can compare the sensor data received from the smart dust21- to a user profile, and based on the similarity, authenticate the user. For instance, if a set of biometric data matches the user profile stored biometric data within a predetermined range, then theuser202 can be authenticated. If there are multiple types of biometric data being compared, the similarity may not need to be as close. For instance, if only data relating to facial recognition is collected, and the data matches 94% of the user profile data, then the authentication, which may require a 95% match, may fail. If the facial recognition data, which matches at 94%, is used in conjunction with heart rate data which also matches at 94%, then the authentication may be confirmed. Various matching rates can be authenticated based on the different combinations of sensor data types. Certain forms of biometric data may be considered of a higher quality, or functionality for the purposes of authentication than other types of biometric data. For instance, optical scanning which scans fingerprints can be more definitive for the purposes of authenticating a user than heart rate data. The predetermined matching levels can be set accordingly based on the type of data being collected.
Turning now toFIG. 3, illustrated is anexample system300 for activating a set of smart dust motes in accordance with one or more aspects of the disclosure.
In an embodiment, thesmart dust308 can be activated in response to receiving a notification that the user is trying to make a payment. For instance, at302, the user can try to make a payment with their mobile device, or with a credit card, and a server can send a notification of pending payment or an authorization request tobase station device306.Base station device306 can then send an instruction to activate thesmart dust308. At304, thebase station device306 can release thesmart dust308 which can proceed to collect sensor data relating to the user. The sensor data can be used to authenticate the user. Thesmart dust308 can send the sensor data tobase station device306 which can perform the authentication in some embodiments, or can send the sensor data to the server to perform the authentication.
Turning toFIG. 4, illustrated is anexample system400 for selecting a set of smart dust motes to authenticate a user in accordance with one or more aspects of the disclosure.
In an embodiment,base station device404 can determine whether to collect data from one or more of the motes (e.g., motes406) of the set of MEMs devices that make up the smart dust used to authenticate theuser402. For instance, the communications between thebase station device404 and themotes408 may have interference or increased packet loss due to range from thebase station device404. If the signal to noise ratio for communications frommotes408 to thebase station device404 is below a predetermined criterion, the mote may not be selected for authenticating the user. In other embodiments, the environmental context may reduce the efficacy of the sensor data received from certain types of sensors. For instance, if the lighting is poor, optical data may be of less value than temperature, audio and pressure data. In other embodiments, if the ambient noise level is high, optical data may be of more value than audio data.
Turning toFIG. 5, illustrated is anexample system500 for authenticating a user using smart dust in accordance with one or more aspects of the disclosure.
In an embodiment, the MEMs devices of thesmart dust508 can include respective identification numbers (e.g., serial numbers). When transmitting the sensor data to thebase station device504, the motes can send the serial numbers as well. Since thesmart dust508 may be issued to theuser502 by the financial institution associated with the credit card or payment method, thesmart dust508 serial numbers can also be used to authenticate theuser502 and allow the payment to proceed.
The serial numbers can be used to generate a virtual card number that is established based on a communication channel between thesmart dust104 and thecredit card506 or other payment method. Once theuser502 is authenticated, the virtual number can be used to process the payment. If thesmart dust104 is not in the vicinity of thecredit card506, the virtual number may not be generated, and the payment will not proceed. In an embodiment, the virtual number can be based on a function of the biometric data and the respective identification numbers.
Turning now toFIG. 6, illustrated is an example basestation device system600 in accordance with one or more aspects of the disclosure.Base station device602 can include acommunication component604 configured to communicate with a server and with smart dust MEMs devices. Thecommunication component604 can receive a notification that there is a pending payment or an authorization request tobase station device602.Activation component608 can then send an instruction to activate the smart dust via thecommunication component604, which can proceed to collect sensor data relating to the user and return the data tocommunication component604.
Based on the sensor data received thecommunication component604,authentication component606 can authenticate the user.Authentication component606 can compare the sensor data received from the smart dust to a user profile, and based on the similarity, authenticate the user. For instance, if a set of biometric data matches the user profile stored biometric data within a predetermined range, then the user can be authenticated. If there are multiple types of biometric data being compared, the similarity may not need to be as close. For instance, if only data relating to facial recognition is collected, and the data matches 94% of the user profile data, then the authentication, which may require a 95% match, may fail. If the facial recognition data, which matches at 94%, is used in conjunction with heart rate data which also matches at 94%, then the authentication may be confirmed. Various matching rates can be authenticated based on the different combinations of sensor data types. Certain forms of biometric data may be considered of a higher quality, or functionality for the purposes of authentication than other types of biometric data. For instance, optical scanning which scans fingerprints can be more definitive for the purposes of authenticating a user than heart rate data. The predetermined matching levels can be set accordingly based on the type of data being collected.
Selection component610 can determine whether to collect data from one or more of the motes of the set of MEMs devices that make the smart dust. For instance, the communications between thebase station device602 and the individual motes may have interference or increased packet loss (e.g., due to range from the base station device602) for certain motes. If the signal to noise ratio for communications from particular motes to thebase station device602 is below a predetermined criterion, the mote may not be selected for authenticating the user. In other embodiments, the environmental context may reduce the efficacy of the sensor data received from certain types of sensors. For instance, if the lighting is poor, optical data may be of less value than temperature, audio and pressure data. In other embodiments, if the ambient noise level is high, optical data may be of more value than audio data.
In an embodiment,selection component610 can also select a number of motes from which to collect data from based on a priority level or type of transaction requested. For instance, a low security login may only require data from one or two motes, whereas a higher level security login may request data from three or more motes before authenticating the login.
FIGS. 7-8 illustrates processes in connection with the aforementioned systems. The process inFIGS. 7-8 can be implemented for example by systems andmethods100,200,300,400,500, and600 illustrated inFIGS. 1-6 respectively. While for purposes of simplicity of explanation, the methods are shown and described as a series of blocks, it is to be understood and appreciated that the claimed subject matter is not limited by the order of the blocks, as some blocks may occur in different orders and/or concurrently with other blocks from what is depicted and described herein. Moreover, not all illustrated blocks may be required to implement the methods described hereinafter.
Turning now toFIG. 7, illustrated is an example flow chart of amethod700 for receiving and broadcasting application updates, according to one or more embodiments. The method can start at702, where the method includes determining, by a base station device comprising a processor, that an access request is to be authenticated, wherein the access request is associated with a user profile. At704, the method includes transmitting an instruction to activate a set of microelectromechanical systems devices, wherein the set of microelectromechanical systems devices are configured to collect sensor data. At706, the method includes receiving the sensor data from the set of microelectromechanical systems devices, wherein the sensor data comprises biometric data. At708 the method includes authenticating the user access request based at least in part on the biometric data matching data associated with user profile.
Turning now toFIG. 8, illustrated is amethod800 for receiving and broadcasting application updates, according to one or more embodiments. At802 the method includes selecting the set of microelectromechanical systems devices based on a signal to noise ratio of a signal received from the set of microelectromechanical systems devices. At804 the method includes selecting the set of microelectromechanical systems devices based on a predetermined condition relating to quality of data associated with a signal received from the set of microelectromechanical systems devices.
Referring now toFIG. 9, there is illustrated a block diagram of a computer operable to execute the disclosed architecture. In order to provide additional context for various aspects of the subject innovation,FIG. 9 and the following discussion are intended to provide a brief, general description of asuitable computing environment900 in which the various aspects of the innovation can be implemented. While the innovation has been described above in the general context of computer-executable instructions that may run on one or more computers, those skilled in the art will recognize that the innovation also can be implemented in combination with other program modules or components and/or as a combination of hardware and software.
Generally, program modules include routines, programs, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Moreover, the inventive methods can be practiced with other computer system configurations, including single-processor or multiprocessor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based or programmable consumer electronics, and the like, each of which can be operatively coupled to one or more associated devices.
The illustrated aspects of the innovation may also be practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules can be located in both local and remote memory storage devices.
A computer typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer-readable media can comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the computer.
Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer-readable media.
With reference again toFIG. 9, theexemplary environment900 for implementing various aspects of the innovation includes acomputer902, thecomputer902 including aprocessing unit904, asystem memory906 and asystem bus908. Thesystem bus908 couples system components including, but not limited to, thesystem memory906 to theprocessing unit904. Theprocessing unit904 can be any of various commercially available processors. Dual microprocessors and other multi-processor architectures may also be employed as theprocessing unit904.
Thesystem bus908 can be any of several types of bus structure that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. Thesystem memory906 includes read-only memory (ROM)910 and random access memory (RAM)912. A basic input/output system (BIOS) is stored in anon-volatile memory910 such as ROM, EPROM, EEPROM, which BIOS contains the basic routines that help to transfer information between elements within thecomputer902, such as during start-up. TheRAM912 can also include a high-speed RAM such as static RAM for caching data.
Thecomputer902 further includes an internal hard disk drive (HDD)914 (e.g., EIDE, SATA), which internalhard disk drive914 may also be configured for external use in a suitable chassis (not shown), a magnetic floppy disk drive (FDD)916, (e.g., to read from or write to a removable diskette918) and anoptical disk drive920, (e.g., reading a CD-ROM disk922 or, to read from or write to other high capacity optical media such as the DVD). Thehard disk drive914,magnetic disk drive916 andoptical disk drive920 can be connected to thesystem bus908 by a harddisk drive interface924, a magneticdisk drive interface926 and anoptical drive interface928, respectively. Theinterface924 for external drive implementations includes at least one or both of Universal Serial Bus (USB) and IEEE 1394 interface technologies. Other external drive connection technologies are within contemplation of the subject innovation.
The drives and their associated computer-readable media provide nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For thecomputer902, the drives and media accommodate the storage of any data in a suitable digital format. Although the description of computer-readable media above refers to a HDD, a removable magnetic diskette, and a removable optical media such as a CD or DVD, other types of media which are readable by a computer, such as zip drives, magnetic cassettes, flash memory cards, cartridges, and the like, may also be used in the exemplary operating environment, and further, that any such media may contain computer-executable instructions for performing the methods of the innovation.
A number of program modules can be stored in the drives andRAM912, including anoperating system930, one ormore application programs932,other program modules934 andprogram data936. All or portions of the operating system, applications, modules, and/or data can also be cached in theRAM912. The innovation can be implemented with various commercially available operating systems or combinations of operating systems.
A user can enter commands and information into thecomputer902 through one or more wired/wireless input devices, e.g., akeyboard938 and a pointing device, such as amouse940. Other input devices (not shown) may include a microphone, an IR remote control, a joystick, a game pad, a stylus pen, touch screen, or the like. These and other input devices are often connected to theprocessing unit904 through aninput device interface942 that is coupled to thesystem bus908, but can be connected by other interfaces, such as a parallel port, an IEEE 1394 serial port, a game port, a USB port, an IR interface, etc.
Amonitor944 or other type of display device is also connected to thesystem bus908 via an interface, such as avideo adapter946. In addition to themonitor944, a computer typically includes other peripheral output devices (not shown), such as speakers, printers, etc.
Thecomputer902 may operate in a networked environment using logical connections via wired and/or wireless communications to one or more remote computers, such as a remote computer(s)948. The remote computer(s)948 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all of the elements described relative to thecomputer902, although, for purposes of brevity, only a memory/storage device950 is illustrated. The logical connections depicted include wired/wireless connectivity to a local area network (LAN)952 and/or larger networks, e.g., a wide area network (WAN)954. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, e.g., the Internet.
When used in a LAN networking environment, thecomputer902 is connected to thelocal network952 through a wired and/or wireless communication network interface oradapter956. Theadapter956 may facilitate wired or wireless communication to theLAN952, which may also include a wireless access point disposed thereon for communicating with thewireless adapter956.
When used in a WAN networking environment, thecomputer902 can include amodem958, or is connected to a communications server on theWAN954, or has other means for establishing communications over theWAN954, such as by way of the Internet. Themodem958, which can be internal or external and a wired or wireless device, is connected to thesystem bus908 via theserial port interface942. In a networked environment, program modules or components depicted relative to thecomputer902, or portions thereof, can be stored in the remote memory/storage device950. The network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
Thecomputer902 is operable to communicate with any wireless devices or entities operatively disposed in wireless communication, e.g., a printer, scanner, desktop and/or portable computer, portable data assistant, communications satellite, any piece of equipment or location associated with a wirelessly detectable tag (e.g., a kiosk, news stand, restroom), and telephone. This includes at least Wi-Fi and Bluetooth™ wireless technologies. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices.
Wi-Fi, or Wireless Fidelity, allows connection to the Internet from a couch at home, a bed in a hotel room, or a conference room at work, without wires. Wi-Fi is a wireless technology similar to that used in a cell phone that enables such devices, e.g., computers, to send and receive data indoors and out; anywhere within the range of a base station. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b, g, n, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wired networks (which use IEEE 802.3 or Ethernet). Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, at an 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, or with products that contain both bands (dual band), so the networks can provide real-world performance similar to wired Ethernet networks used in many offices.
Referring now toFIG. 10, there is illustrated a schematic block diagram of anexemplary computing environment1000 in accordance with the subject innovation. Thesystem1000 includes one or more client(s)1002. The client(s)1002 can be hardware and/or software (e.g., threads, processes, computing devices).
Thesystem1000 also includes one or more server(s)1004. The server(s)1004 can also be hardware and/or software (e.g., threads, processes, computing devices). Theservers1004 can house threads to perform transformations by employing the innovation, for example. One possible communication between aclient1002 and aserver1004 can be in the form of a data packet adapted to be transmitted between two or more computer processes. Thesystem1000 includes a communication framework1006 (e.g., a global communication network such as the Internet) that can be employed to facilitate communications between the client(s)1002 and the server(s)1004.
Communications can be facilitated via a wired (including optical fiber) and/or wireless technology. The client(s)1002 are operatively connected to one or more client data store(s)1008 that can be employed to store information local to the client(s)1002. Similarly, the server(s)1004 are operatively connected to one or more server data store(s)1010 that can be employed to store information local to theservers1004.
What has been described above includes examples of the innovation. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the subject innovation, but one of ordinary skill in the art may recognize that many further combinations and permutations of the innovation are possible. Accordingly, the innovation is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims. Furthermore, to the extent that the term “includes” is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term “comprising” as “comprising” is interpreted when employed as a transitional word in a claim.